Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Security Administration GSEC Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GSEC Premium Access

View all detail and faqs for the GSEC exam


746 Students Passed

89% Average Score

94% Same Questions
Viewing page 10 out of 12 pages
Viewing questions 91-100 out of questions
Questions # 91:

Which of the following is a new Windows Server 2008 feature for the Remote Desktop Protocol (RDP)?

Options:

A.

The ability to allow the administrator to choose a port other than the default RDP port (TCP 3389)

B.

The ability to support connections from mobile devices like smart phones

C.

The ability to allow clients to authenticate over TLS

D.

The ability to allow clients to execute individual applications rather than using a terminal desktop

Questions # 92:

Which of the following protocols allows an e-mail client to access and manipulate a remote e-mail file without downloading it to the local computer?

Options:

A.

IMAP

B.

SNMP

C.

POP3

D.

SMTP

Questions # 93:

What is the name of the Windows XP/2003 tool that you can use to schedule commands to be executed on remote systems during off-peak hours?

Options:

A.

SCHTASKS.EXE

B.

SCHEDULETSKS.EXE

C.

SCHEDULR.EXE

D.

SCHRUN.EXE

Questions # 94:

If you do NOT have an original file to compare to, what is a good way to identify steganography in potential carrier files?

Options:

A.

Determine normal properties through methods like statistics and look for changes

B.

Determine normal network traffic patterns and look for changes

C.

Find files with the extension .stg

D.

Visually verify the files you suspect to be steganography messages

Questions # 95:

You have implemented a firewall on the company's network for blocking unauthorized network connections. Which of the following types of security control is implemented in this case?

Options:

A.

Detective

B.

Preventive

C.

Directive

D.

Corrective

Questions # 96:

Which of the following terms is used for the process of securing a system or a device on a network infrastructure?

Options:

A.

Hardening

B.

Authentication

C.

Cryptography

D.

Sanitization

Questions # 97:

Which of the following defines the communication link between a Web server and Web applications?

Options:

A.

CGI

B.

PGP

C.

Firewall

D.

IETF

Questions # 98:

Users at the Marketing department are receiving their new Windows XP Professional workstations. They will need to maintain local work files in the first logical volume, and will use a second volume for the information shared between the area group. Which is the best file system design for these workstations?

Options:

A.

Both volumes should be converted to NTFS at install time.

B.

First volume should be FAT32 and second volume should be NTFS.

C.

First volume should be EFS and second volume should be FAT32.

D.

Both volumes should be converted to FAT32 with NTFS DACLs.

Questions # 99:

Which Linux file lists every process that starts at boot time?

Options:

A.

inetd

B.

netsrv

C.

initd

D.

inittab

Questions # 100:

The TTL can be found in which protocol header?

Options:

A.

It is found in byte 8 of the ICMP header.

B.

It is found in byte 8 of the IP header.

C.

It is found in byte 8 of the TCP header.

D.

It is found in byte 8 of the DNS header.

Viewing page 10 out of 12 pages
Viewing questions 91-100 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.